What Kaspersky really discovered...

Daniel Boctor
21 Jun 202419:56

Summary

TLDROn May 12, 2017, the world experienced a massive cyber attack known as WannaCry, which encrypted data on hundreds of thousands of computers globally, demanding ransom payments. This attack utilized the EternalBlue exploit, developed by the NSA and later leaked by the Shadow Brokers. Despite a patch being available, many systems remained vulnerable, leading to widespread damage and disruption, especially in the UK's National Health Service. The attack highlighted significant vulnerabilities in global cyber defenses and raised questions about the responsibility of government agencies in handling such exploits.

Takeaways

  • 🖥️ On May 12, 2017, a global cyber attack known as WannaCry encrypted data on computers, demanding a ransom for decryption.
  • 💰 Victims had to pay $300 within 3 days or $600 after that, with the threat of permanent data loss if no payment was made after a week.
  • 🌍 WannaCry quickly spread to other devices on the network, becoming a self-replicating worm that infected over 230,000 computers in 150 countries within a day.
  • 🏥 The UK's National Health Service was severely affected, with up to 70,000 devices impacted, leading to emergency patient diversions and operational disruptions.
  • 🇰🇵 The United States attributed the attack to North Korea in December 2017, later indicting three North Korean officials.
  • 🔒 The attack utilized the EternalBlue exploit, initially developed by the NSA and later leaked by a group called The Shadow Brokers.
  • 🛠️ EternalBlue exploits a vulnerability in Microsoft's SMBv1 protocol, enabling the worm to spread across networks.
  • 🔓 Despite a patch being released by Microsoft in March 2017, many systems remained unpatched, allowing WannaCry to cause widespread damage.
  • 🐛 EternalBlue involves an exploit chain leveraging three bugs, causing a buffer overflow and arbitrary memory allocation.
  • 🚑 Following the WannaCry attack, another significant cyber attack using NotPetya malware targeted Ukraine, causing over $10 billion in damages.

Q & A

  • What happened on the morning of May 12th, 2017?

    -On the morning of May 12th, 2017, individuals found a prompt from a program called WannaCry informing them that their data had been encrypted and was being held for ransom.

  • How does the WannaCry malware spread across networks?

    -WannaCry malware spreads across networks using a self-replicating mechanism, functioning as a computer worm that propagates itself without user interaction.

  • What was the global impact of the WannaCry attack within the first day?

    -Within a single day, over 230,000 computers across 150 different countries were infected by WannaCry, causing damages ranging from hundreds of millions to billions of dollars.

  • Which major organization was significantly impacted by the WannaCry attack?

    -The National Health Service (NHS) in the UK was significantly impacted, with up to 70,000 devices affected, leading to emergency patients being turned away and ambulances being diverted.

  • Who did the United States formally assert was behind the WannaCry attack?

    -In December 2017, the United States formally asserted that North Korea was behind the WannaCry attack, later indicting three North Korean officials.

  • What was the purpose of the NotPetya malware during the 2017 Ukraine ransomware attacks?

    -The NotPetya malware, initially mistaken for ransomware, was actually a disc wiper designed to cause maximum damage to its targets.

  • Which country did the United States claim was behind the NotPetya attack?

    -The United States claimed that Russia was behind the NotPetya attack, indicting a total of six Russian officials.

  • What common exploit did these cyber attacks (WannaCry and NotPetya) utilize?

    -Both WannaCry and NotPetya utilized the EternalBlue exploit, which targeted Microsoft's SMBv1 protocol.

  • What is the significance of the SMB protocol in the context of the EternalBlue exploit?

    -The SMB (Server Message Block) protocol is widely used for file sharing and print services on Windows computers and servers. Its vulnerability made it an ideal target for a computer worm like EternalBlue.

  • How did the EternalBlue exploit become publicly available?

    -The EternalBlue exploit became publicly available after a group called The Shadow Brokers stole it from the NSA and released it online in April 2017.

  • What is 'Heap grooming' in the context of the EternalBlue exploit?

    -Heap grooming is a technique used in the EternalBlue exploit to manipulate memory allocation and create conditions for successful exploitation, such as buffer overflows.

  • Why was the NSA criticized regarding the EternalBlue exploit?

    -The NSA was criticized for not informing Microsoft about the vulnerabilities in SMBv1 protocol and instead keeping them under wraps, which led to massive damage once the exploit was released publicly.

Outlines

00:00

💻 The Start of the WannaCry Cyber Attack

On May 12, 2017, a global cyber attack began, known as WannaCry. Victims found their data encrypted and a ransom demanded to decrypt it. The attack spread rapidly through networks via a self-replicating mechanism, making it a computer worm. Within hours, it infected thousands of devices worldwide, causing significant damage and disruptions, particularly to the UK's National Health Service.

05:02

🔒 EternalBlue and the Spread of Malware

WannaCry used the EternalBlue exploit, developed by the NSA, to spread. Despite a patch released by Microsoft, many systems remained vulnerable. EternalBlue leverages several bugs to compromise remote systems without user interaction. It manipulates SMB protocol communications, exploiting buffer overflows to gain control over target systems, making detection difficult.

10:02

📂 Technical Details of EternalBlue Exploits

EternalBlue exploits involve casting bugs in SMB protocol, causing buffer overflows in the non-paged kernel pool. By sending specially crafted packets, attackers can manipulate memory allocation and execute arbitrary code. The exploit uses an out-of-bounds write to inject malicious data, bypassing various security measures like address space layout randomization and data execution prevention.

15:02

🛡️ Understanding Buffer Overflow Protections

Buffer overflows are severe vulnerabilities, but not enough alone to compromise systems. EternalBlue combines them with sophisticated techniques to bypass protections. This section highlights the importance of proper understanding and problem-solving skills in cybersecurity, promoting Brilliant as a learning tool. The video concludes with a call to check out part two for more details on EternalBlue's mechanics.

Mindmap

Keywords

💡WannaCry

WannaCry is a ransomware cryptoworm that emerged in May 2017. It encrypted data on infected computers, demanding ransom payments in Bitcoin. The video discusses its rapid spread and the significant impact on organizations globally, such as the National Health Service (NHS) in the UK, highlighting the severity of the attack.

💡EternalBlue

EternalBlue is a cyber exploit developed by the NSA that targets Microsoft's SMB protocol. It was leaked by the Shadow Brokers and used in major cyberattacks like WannaCry. The video's theme centers on how EternalBlue facilitated the spread of these attacks by exploiting a critical vulnerability.

💡Shadow Brokers

The Shadow Brokers are a hacking group that leaked NSA's cyber tools, including EternalBlue. Their actions in 2016 led to the public release of these exploits, which were later used in global cyberattacks. The video emphasizes their role in exposing these vulnerabilities to malicious actors.

💡NSA

The National Security Agency (NSA) is a U.S. government agency responsible for signal intelligence and cybersecurity. The video explains how the NSA developed the EternalBlue exploit but failed to inform Microsoft, leading to widespread vulnerabilities once the exploit was leaked.

💡SMB Protocol

Server Message Block (SMB) Protocol is used for network file sharing and communication between computers. The video highlights its importance and how vulnerabilities in SMB were exploited by EternalBlue, making it a crucial aspect of the attacks discussed.

💡Ransomware

Ransomware is a type of malicious software that encrypts data and demands payment for its release. The video focuses on WannaCry and NotPetya as examples of ransomware that caused significant damage worldwide, emphasizing the financial and operational impact of such attacks.

💡North Korea

North Korea was identified by the U.S. as the entity behind the WannaCry attack. The video discusses the geopolitical implications of attributing cyberattacks to nation-states and the formal indictments against North Korean officials for their involvement.

💡NotPetya

NotPetya is another malware discussed in the video, initially mistaken for ransomware but later identified as a disk wiper. It caused extensive damage, particularly in Ukraine, with estimated losses over $10 billion. The video compares its impact to WannaCry, showing the evolution and severity of cyber threats.

💡Cybersecurity

Cybersecurity is the practice of protecting systems and networks from digital attacks. The video's theme revolves around the importance of cybersecurity, detailing how vulnerabilities like EternalBlue can lead to massive global attacks, underscoring the need for robust security measures.

💡Equation Group

Equation Group is an elite cyber-attack group associated with the NSA, known for sophisticated cyber tools and techniques. The video references this group to explain the origin of the EternalBlue exploit and its advanced capabilities, highlighting the complex nature of state-sponsored cyber warfare.

Highlights

On May 12th, 2017, users worldwide woke up to find their computers infected with the WannaCry ransomware.

The WannaCry ransomware encrypted users' data, demanding $300 in Bitcoin within three days, doubling the amount after that period.

WannaCry spread autonomously across networks, exploiting a vulnerability in Microsoft's SMB protocol, making it a computer worm.

Within a single day, WannaCry infected over 230,000 computers in 150 countries, causing damages estimated between hundreds of millions to billions of dollars.

The UK's National Health Service was significantly impacted, with up to 70,000 devices affected, forcing the diversion of emergency patients.

The United States formally accused North Korea of orchestrating the WannaCry attack in December 2017, later indicting three North Korean officials.

Following WannaCry, the NotPetya malware caused even greater damage, initially mistaken for ransomware but later identified as a disk wiper.

NotPetya's attack in 2017 caused over $10 billion in damages, becoming one of the most devastating cyber attacks in history.

The United States blamed Russia for the NotPetya attack, indicting six Russian officials, though Russia denied involvement.

The common link between these major cyber attacks was the use of the EternalBlue exploit, developed by the NSA's Equation Group.

The NSA did not disclose the SMB vulnerability to Microsoft for years, until their own breach by the Shadow Brokers in 2016.

The Shadow Brokers released the EternalBlue exploit publicly in April 2017, making it available for various threat actors to use.

Despite a patch being released two months prior, many systems remained unpatched, leading to the widespread impact of WannaCry.

EternalBlue exploits three different bugs in SMB to achieve a buffer overflow and arbitrary memory allocation.

EternalBlue's sophisticated techniques allow it to inject payloads directly into SMB's memory space, avoiding detection by not creating new processes.

Transcripts

play00:00

it's the morning of May 12th 2017 nothing  seems out of the ordinary as you wake up  

play00:05

and start your day that is until you go to  turn on your computer and are greeted with

play00:10

this you find a prompt from a program called  wanted a crypter informing you that all of your  

play00:31

data has been encrypted with the decryption Keys  being held for ransom if you want your data back  

play00:36

you have 3 days to pay the initial Ransom of  $300 at which point you'll be raised to $600  

play00:43

if no payments are made after a week your files  will be permanently lost you just became one of  

play00:48

the first victims of a worldwide Cyber attack  known as W cry amid the Panic unbeknown to you  

play00:54

monoc cry just spread to all the other devices  on your network after infecting a computer it  

play01:00

a fully autonomous self-replicating mechanism  that enables it to silently spread across  

play01:04

networks without requiring any user interaction  this makes it a computer worm which by Design  

play01:11

will self- multiply and propagate itself at  an exponential rate at 744 UTC the first case  

play01:17

was identified at a Southeast Asian ISP  shortly after cases were starting to be  

play01:23

identified globally a mere 5 hours after the  first case 72% of isps in Asia were infected  

play01:30

despite the discovery of a kill switch by a  British security researcher the damage was already  

play01:35

done within a single day over 230,000 computers  across 150 different countries were infected  

play01:42

with damages ranging from hundreds of millions to  billions of dollars the National Health Service in  

play01:48

the UK was among the largest agency struck with  up to 70,000 devices affected certain locations  

play01:54

had to turn away emergency patients and various  ambulances had to be diverted to other hospitals  

play02:00

in December 2017 the United States formally  asserted that North Korea was behind the attack  

play02:06

later indicting three North Korean officials  North Korea denied any involvement as laid out  

play02:13

in today's indictment North Korea's operatives  using keyboards rather than guns stealing digital  

play02:19

wallets of cryptocurrency instead of sacks  of cash have become the world's leading bank

play02:24

robbers as the chaos was settling about a month  after the wry outbreak a series of powerful  

play02:33

cyber attacks using the not Pia malware were  Unleashed during the 2017 Ukraine ransomware  

play02:39

attacks although it was mistaken for ransomware  at first it was quickly realized to be a disc  

play02:44

wiper designed to cause maximum damage to its  targets despite only having a single day to  

play02:49

spread damages were estimated to be over10 billion  becoming one of the most devastating cyber attacks  

play02:56

in history the United States claimed Russia was  behind the attack back indicting a total of six  

play03:01

Russian officials Russia denied any involvement  in the coming months several other cyber attacks  

play03:08

arose globally the United States continued to make  indictments something seemed to be tying these  

play03:14

together why were the most severe cyber attacks  in history suddenly happening all at once and just  

play03:20

as importantly why were they all computer worms  it turns out that they were all using the same  

play03:25

exploit Eternal blue surprisingly Eternal blue was  developed by the National Security Agency a branch  

play03:32

of the United States Department of Defense within  the NSA the specific unit is known as the equation  

play03:38

group a threat actor kaspersky describes as  surpassing anything known in terms of complexity  

play03:44

and sophistication of techniques several years  prior to the attacks Eternal blue was developed  

play03:50

as part of a collection of exploits known as the  Eternal exploits which targeted Microsoft's SMB  

play03:56

V1 protocol SMB or server message block is one of  the most widely used communication protocols in  

play04:02

the world it is primarily used for file sharing  and print services on Windows computers and  

play04:08

servers among other devices a vulnerability in  SMB lends itself perfectly to a computer worm  

play04:14

as it is already extensively used across home  and Enterprise networks with Port 445 left open  

play04:20

for legitimate SMB traffic on top of this it  was enabled on systems by default at the time  

play04:27

the NSA rather than informing Microsoft about  the vulnerabilities decided to keep them under  

play04:32

wraps for several years this was until the  NSA themselves were hacked by a group called  

play04:37

The Shadow brokers in 2016 the shadow broker  stole a collection of exploits from the NSA  

play04:43

and attempted to auction them off online unsure of  the legitimacy of such claims there were no bits  

play04:49

when the NSA realized that they were breached they  ended up informing Microsoft to release a patch on  

play04:54

March 14th 2017 a month later on April 14th the  the shadow Brokers decided to publicly release  

play05:01

the exploits free of charge the dump included the  infamous Eternal blue exploit alongside the rest  

play05:07

of the Eternal exploits an exploitation  framework a command and control solution  

play05:12

and a backdoor implant for use after an initial  exploitation with all these exploits and tools now  

play05:18

publicly available various threat actors began to  incorporate them into their own malware not even a  

play05:24

month later Wan cry took hold of the world despite  a patch technically being released 2 months prior  

play05:30

the countless number of individuals and  organizations that don't regularly update  

play05:34

their OS were left exposed now that we understand  the source and significance of Eternal blue  

play05:39

let's take a look under the hood and see how it's  actually able to fully compromise a remote system  

play05:44

without any user interaction rather than being a  single exploit Eternal blue is an exploit chain  

play05:50

leveraging three different underlying bugs the  first two bugs work together to induce a buffer  

play05:55

overflow while the third bug enables us to force  a memory allocation of arbitrary size while these  

play06:01

bugs may seem obscure in isolation they all come  together in the end during the exploitation phase  

play06:07

using a technique known as Heap grooming or as I  like to call it Heap Fang what makes Eternal blue  

play06:13

especially impressive is that it injects its  chosen payo directly into smb's memory space  

play06:18

running entirely within the SMB process on  the target machine this makes it exceedingly  

play06:23

difficult to detect as it doesn't create any new  processes but I digress to understand the exact  

play06:29

mechanics at the heart of Eternal blue let's  start by taking a look at the SMB protocol  

play06:35

similar to other protocols communication within  SMB takes the form of requests and responses being  

play06:40

exchanged between two devices the specific unit  of information being exchanged is called an SMB  

play06:45

message also referred to as an SMB packet these  packets are divisible into three parts being the  

play06:52

header block parameter block and data block the  header block contains a field for the SMB command  

play06:58

which is used to specify the type of operation  such as creating reading or deleting a file  

play07:04

when dealing with operations pertaining to files  you may encounter the case where extended file  

play07:08

attributes or fees are used a fee is just a way to  store metadata associated with a file beyond the  

play07:15

standard attributes defined by the file system  itself each fee takes the form of a key value  

play07:21

pair alongside their respective sizes the exact  implementation and format of these key value pairs  

play07:27

varies by operating system for instance os2 and  the Windows NT family have different fee formats  

play07:35

since SMB is compatible across different operating  systems it's possible to get into a case where os2  

play07:41

formatted fees need to be cast to NT formatted  fees the first bug that Eternal blue exploits  

play07:47

is the wrong casting bug where a buggy casting  operation is used to cast os2 fees to NT fees  

play07:54

which causes a buffer overflow in the non-paged  kernel pool just as an aside the non-paged pool  

play08:00

is just a memory pool that is designated to remain  on the physical RAM this is opposed to the paged  

play08:06

pool which can spill over from the physical RAM  onto a slower page file on the disk but I digress  

play08:12

in order to see how this buggy casting operation  is able to cause a buffer overflow we first need  

play08:17

to understand how these fees are represented in  code os2 fees actually require the use of two  

play08:23

structures each individual fee is represented with  an os2 fee structure multiple of these are store  

play08:29

together using an os2 fee list which combines them  all together and stores the total size of the list  

play08:35

in bytes NT fees on the other hand use a structure  called NTV list which are chained together backto  

play08:43

back in memory this approach is known as an offset  based linked list each instance represents a  

play08:49

single fee with the next entry offset field being  used to tell where the next instance is located in  

play08:54

memory relative to the current one to navigate the  notes in the list you would keep on on adding the  

play09:00

offset to the current nodes memory address until  you reach the end now that we know how these two  

play09:05

different types of fees are represented let's see  what happens when we get into the case where we  

play09:09

need to cast an os2 fist to an NT fist the serve  os2 fist to n function will be used let's take a  

play09:18

look inside just to be clear the purpose of this  function is to create an N fist given an os2 fist  

play09:25

in order to do this we first need to determine the  appropriate size for the student to be created to  

play09:30

NT fist which is done with the serve os2 fist size  to NT helper function then we'll use the size that  

play09:37

this function returns to allocate a buffer in  the non-paged pool for the new NT fist once the  

play09:43

allocation is made the last step is to convert  and add the individual fees from the os2 Feist  

play09:49

to the NT Feist this is done by iterating over  the individual os2 fist entries until it reaches  

play09:56

size of list in bytes within each iteration it can  converts the os2 record to the NT format and adds  

play10:02

it to the NT fist it's important to note that the  size of list in byes field is used to determine  

play10:07

how much underlying data is transferred into  the NT fist now that we know that there's three  

play10:12

different steps let's go ahead and look at them  in more detail starting with the serve os2 fist  

play10:17

size to NT function this function actually does  two distinct things first it calculates the size  

play10:24

needed for the NT fist this is the return value of  the function which is used to allocate the buffer  

play10:29

as we just saw the second thing it's going to  do will only happen on a specific Edge case  

play10:34

in response to a malformed SMB packet because  the size of list in byes field doesn't actually  

play10:40

restrict the SMB packet size it's possible to  carefully craft a packet with some amount of  

play10:45

fees that actually extend past whatever value is  set as the size of list in bytes this would be a  

play10:51

malformed packet why the function doesn't just  drop these malformed packets as anyone's guess  

play10:57

instead what it does is it shrinks the size of  list in byes value down to the nearest inbounds  

play11:02

fee this new value that it calculates overwrites  the original size of list in bites value even  

play11:08

though this may seem like weird Behavior it's  not inherently dangerous some fees may be lost  

play11:13

during the casting process but that's about it  so where exactly does this bug lie recall that  

play11:19

under normal circumstances with an intact SMB  packet nothing is modified only with a specific  

play11:25

Edge case with overflowing fees will size of  list in bytes be shrunk let's take a look at  

play11:30

how it is shrunk basically size of list in bytes  is defined as a u long which takes up the size  

play11:37

of a d-word this is a 4 byte value the function  that's run to overwrite the size treats it as a  

play11:43

u short which takes up the size of a word this is  a two byte value this mismatch is the basis of the  

play11:50

first bug this means that if shrinking is needed  the two least significant bites will be modified  

play11:56

while the two most significant bites will remain  untouched due to the fact that the function treats  

play12:01

a 4 byte dword as a two byte word this means that  if size of list in bytes is less than 2 to the 16  

play12:08

meaning it fits entirely within the range of the  two rightmost bytes known as the low dword it will  

play12:14

be shrunk as expected however if it is greater  than 2 to the 16 and spans both the high dword  

play12:20

and low dword the function will only affect the  low DW leaving the high dword intact because of  

play12:27

this depending on the exact value being used size  of list in bytes may be enlarged instead of shrunk  

play12:34

let's see how much damage this can actually  cause zooming back out to our casting process  

play12:38

at a high level recall that the last step in the  casting process will iterate over each os2 fee in  

play12:45

the os2 fee list converting and appending it to  the NT fee list until it reaches size of list in  

play12:51

bytes everything contained within this area is  set to be copied over into the NTI fist buffer  

play12:57

when creating this carefully crafted packets the  size of Liston byes field is going to be set to a  

play13:03

controlled value larger than 2 to the 16 in hopes  of triggering the bug that mistakenly enlarges it  

play13:09

due to the enlargement of this field the area to  be copied over is increased throughout this entire  

play13:15

process up until this point I left out a key piece  of information about the specially crafted packet  

play13:21

when we created this packet we actually would  have placed some unrelated attacker chosen data  

play13:26

directly following the fist keep it in mind  that despite the size of list in bytes being  

play13:31

wrongfully enlarged the size for the newly created  nist buffer is calculated correctly because of  

play13:38

the enlarged value of size of list in bytes the  area to be copied over is now larger than the NT  

play13:43

Feist buffer size itself meaning more data will be  copied over than can fit within the buffer this is  

play13:50

known as an outof bounce right in addition to all  of the fees being copied over the arbitrary data  

play13:56

that we included within our malformed packet will  also be copied over as well so long as it fits  

play14:01

within the area marked by size of list in bytes  in short bug a achieves an outof bounds right  

play14:07

of arbitrary data past the bounds of the NT fist  buffer which resides within the non-paged kernel  

play14:13

pool the important takeaway here is that if there  was anything else directly following the NTI fist  

play14:19

buffer in memory it would be overwritten with  this attacker injected data keep this in mind  

play14:25

for later in the attack so far this makes sense  however you might have been wondering exactly  

play14:30

why a field defined as a u long is treated as  a u short it's actually bug b that makes this  

play14:36

happen you need both bug A and B to pull off this  outof bounds right successfully within SMB there's  

play14:43

several commands that can be used for file related  operations SMBC transaction 2 and SMBC NT transact  

play14:51

are two relevant examples of such commands if  the amount of data that needs to be transmitted  

play14:56

exceeds the maximum within a single SMB pack  packet it may be broken up into multiple packets  

play15:02

each command has a corresponding subcommand ending  in underscore secondary which makes it possible to  

play15:07

send two packets back to back with the secondary  packet containing the remaining data that couldn't  

play15:13

fit within the primary packet it's important to  note that the trans 2 request defines its fields  

play15:18

in word sizes whereas the NT trans request defines  its fields in dword sizes bear with me on this  

play15:26

there is no validation enforcing that multiart  transactions must be of the same type meaning  

play15:31

it's possible to send mismatching primary and  secondary commands what we're going to do is send  

play15:37

an NT trans followed by a trans 2 secondary which  will be traded and parsed as a valid two-part  

play15:43

transaction even though this will be accepted  as a valid transaction we know that these two  

play15:48

transaction types will use different field sizes  The Fault in SMB is that it doesn't take into  

play15:53

account that different transaction types may be  used together despite having different field sizes  

play15:59

as a result the field size of the last transaction  type will be used for parsing all of the packets  

play16:06

this means that the primary ENT trans packet  that uses d-word sizes will be treated as if  

play16:11

it only uses word sizes which is what causes  the incorrect parsing function to be used as  

play16:17

we saw in bug a just to recap bugs A and  B work together to enable an outof bounds  

play16:22

right past the boundary of the NT fist injecting  arbitrary data into the subsequent memory location  

play16:29

within the non-paged kernel pool if you're like  me you've probably been hearing the term buffer  

play16:34

overflow thrown around for quite some time despite  being frequently discussed and widely recognized  

play16:40

as a severe vulnerability buffer overflows on  their own are rarely enough to compromise the  

play16:45

system just because an attacker is able to trigger  a bug doesn't mean that they're able to use it for  

play16:50

anything useful how would the attacker even know  what data lies outside of the buffer there's a  

play16:55

wide variety of buffer overflow protection and  mitigation techniques standing in their way such  

play17:00

as address space layout randomization which breaks  address space predictability and data execution  

play17:05

prevention which marks certain memory regions  as non-executable Eternal blue pairs this buffer  

play17:11

overflow with more sophisticated techniques which  we'll see shortly when I was researching for this  

play17:16

video I came across this Defcon presentation by  Zer sum 0x0 which was invaluable in understanding  

play17:23

the types of techniques you might see at  this level understanding these attacks often  

play17:27

requires a strong Foundation of knowledge and  understanding combined with effective problem  

play17:32

solving skills this is where today's video sponsor  comes in brilliant with brilliant you learn by  

play17:38

doing engaging with thousands of interactive  lessons in math programming computer science  

play17:43

data science and AI brilliant offers lessons  that are designed to instill proper principles  

play17:49

and teach you fundamentals from the ground up in  a Hands-On environment all content on brilliant  

play17:54

is crafted by an award-winning team of teachers  researchers and Prof professionals from schools  

play18:00

such as MIT and Caltech and even industry Partners  such as Google and Microsoft all of their lessons  

play18:06

are filled with Hands-On exercises that let you  play with Concepts in real time a method proven  

play18:11

to be more effective than simply watching  lecture videos brilliant helps to build real  

play18:16

world critical thinking skills through problem  solving not memorizing so while you're building  

play18:21

real knowledge on specific topics you'll also be  becoming a better thinker the best part you don't  

play18:26

need to dedicate hours at a time to learn learning  developing a daily habit of learning is going to  

play18:31

keep your mind sharp and your information diet  rich which is invaluable for both personal and  

play18:36

professional growth that's why brilliant provides  its lessons in manageable bite-sized pieces that  

play18:41

can be done whenever wherever helping you build  real knowledge in just minutes a day personally  

play18:47

I replaced a lot of my social media scrolling  with brilliant and I wouldn't look back you can  

play18:52

start to learn the core mechanics powering  the everyday Technologies we all know and  

play18:56

love such as search engines neural netor works  cryptocurrency or even Quantum Computing most  

play19:02

recently I took their course on large language  models which gives you hands-on experience with  

play19:07

real language models you get to explore the  impact that training data has on the model's  

play19:11

output and even spend some time learning how  to tune an llm to become better suited toward  

play19:16

a specific task this is increasingly relevant  to the age of AI assistant and with the rise of  

play19:22

adverse serial machine learning attacks a robust  set of problemsolving skills and a wide breadth  

play19:27

of knowledge are often key in being able to spot  patterns and piece together Solutions in the world  

play19:32

of cyber security to try everything brilliant  has to offer for free for a full 30 days visit  

play19:38

brilliant.org Danel boter or click the link in  the description you'll also get 20% off in annual  

play19:44

premium subscription this concludes part one of  this two-part series to continue with the series  

play19:50

check out part two which will be available  here once it's released thanks for watching

Rate This

5.0 / 5 (0 votes)

Related Tags
Cyber AttacksRansomwareEternal Blue2017WannaCryNorth KoreaNSA ExploitsCybersecurityNetwork WormGlobal Impact